Articles tagged with: Data Recovery

Why there was a huge demand for Data Recovery in 2014

Data Recovery 2014

Whether it’s corrupt data on a USB stick, hard drive failure or cloud technology, one thing is for sure – 2014 was the year of data recovery. We look at some of the reasons why data recovery was a huge factor in technology over the past year with contributions by UK computer expert Adrian Jean who provides data recovery services in Bristol as well as the surrounding areas.

For more information on data recovery tips see his latest blog:

How Data Protection and Recovery Has Evolved Over The Past 10 Years

Data Protection

Over the past ten years, growth in digital data has placed significant pressure on companies of all sizes to find more efficient ways to protect and recover data in the event of a loss. In this article, we talk about how data protection and recovery technologies have evolved over the last ten years to help overcome these challenges. Computer technicians such as those at CyberCall computer repair Bristol have had to upgrade their technologies to deal with the growing need for data recovery services in the modern day market.

Traditional Backup and Recovery
In the past, the common approach would be to have some type of backup software along with a tape device to back up the data to. Companies would schedule their backups to perform a full backup once a week, typically during the weekend. They would schedule to have daily backups occur throughout the week, backing up whatever data changed that day. These are known as incremental or differential backups. Companies would typically schedule these backups to take place during non-business hours so it would not interfere with normal business operations.

In the event they needed to recover a file or data set, they could then go to a given backup on tape to restore the data needed. This restore process could be very time consuming depending upon the amount of data involved.

As data growth exploded, one of the main challenges companies were faced with was how to efficiently protect the growing amount of data in the same amount of time, or less. More importantly, companies struggled with the ability to recover that data in an efficient amount of time without having a negative impact on the business. Below are some of the current technologies that are leveraged today to help with these issues.

Data Duplication
Data Duplication is offered in many backup software packages today as well as in hardware appliances. Data Duplication leverages hashing algorithms to detect duplicate blocks of data and compresses these identical blocks into a single block within the backup. This reduces the amount of data stored and allows businesses to maintain longer retention of backed up data on disk, minimizing or eliminating the need for tape all together.

Continuous Data Protection CDP
CDP provides continuous protection of data by copying changed bytes in near real time to a backup disk target. This helps eliminate the backup window constraints by providing continuous protection of data throughout the day. CDP also provides more granular recovery points as opposed to restoring data from the previous night’s backup.

Storage-Based Snapshots
Snapshots are very common today in many data storage systems and are often utilized as the primary means of data protection. Snapshots allow IT administrators to create point-in-time copies of data on the primary storage. This is usually accomplished on a scheduled basis throughout the day. These snapshots can then be be mounted for quick recovery of data, instead of having to go true a typical restore process from a backup.

Companies need to have a good understanding of what their business requirements are to make the proper decision as to what strategy and technology is best for them. Often times a combination of solutions is utilized today to satisfy the business requirements. Other technologies such as visualization and archiving can also help augment data protection and recovery.

Article Tag:

  • HowDataProtectionandRecoveryHasEvolvedOverThePast10Years|ComputerLiteracy